If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Recently I've tried to use wifiZoo in conjunction with airtun-ng, to capture cookies from my own WEP encrypted network without connection(association) procedure to an access point. I use BackTrack 4 Final installed on VMachine and wifi usb dongle with RT73 chipset;

I've performed the whole process, begining from key derivation

Here is the sequence of steps:

Step 1: I derived a WEP key using an aircrack-ng suite(from MY access point, I have the permission

Recently I've tried to use wifiZoo in conjunction with airtun-ng, to capture cookies from my own WEP encrypted network without connection(association) procedure to an access point. I use BackTrack 4 Final installed on VMachine and wifi usb dongle with RT73 chipset;

This is known as sidejacking. I have done it successfully using Wireshark instead of wifizoo. One step that might be an issue is that you don't load use the command "modprobe tun" to load the tunneling module.

This is known as sidejacking. I have done it successfully using Wireshark instead of wifizoo. One step that might be an issue is that you don't load use the command "modprobe tun" to load the tunneling module.

if you really want to use wifizoo try dumping the traffic with airodump, decrypting the packets with airdecap-ng -l (the lack of wireless headers is what i suspect is causing problems but ive never used airtun so i dont know for sure) the other advantage of using airdecap-ng is the ability to decrypt wpa traffic, the main disadvantage is that it wont decrypt on the fly.